<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

10 Tips to Reduce Malware Threats

Posted by Kowsik Guruswamy on Mar 6, 2017



Half of the web is vulnerable to malware, as we measured recently in our State of the Web research report, making it clear that merely visiting a legitimate web site is risky.

Read More

Tags: malware, cybersecurity, phishing, isolation, security, ransomware, credential theft, malware vulnerabilities, cyber theft, security strategy, anti-phishing, cyber threats, Google Chrome, bitcoins

RSA 2017 is a Wrap – Were Credential Theft and Phishing on Your Radar?

Posted by Greg Maudsley on Mar 2, 2017

There were many hot topics and cybersecurity themes at this year’s RSA Conference in San Francisco, from ransomware, to Sec Ops, to post breach mitigation.

Read More

Tags: cybersecurity, phishing, credential theft, phishing prevention, Adaptive Clientless Rendering, isolaton

Menlo Security Rings in 2017 with Channel Partner Program

Posted by Doug Schultz on Jan 30, 2017
Read More

Tags: malware, cybersecurity, phishing, threats, security strategy, channel partner

Malware & Credential Theft are the Problems, not Russia

Posted by Greg Maudsley on Jan 19, 2017

 

Read More

Tags: malware, cybersecurity, phishing, isolation, credential theft, gartner, anti-phishing

The Patient Zero Myth

Posted by Greg Maudsley on Oct 26, 2016

In medical terms, Patient Zero is loosely defined as the first human infected by a new or recently discovered viral or bacterial outbreak. The term has found its way into the IT security lexicon where its corollary is the first individual to be infected by a new malware strain, or the first victim in a phishing campaign.

Read More

Tags: malware, cybersecurity, blog, phishing, isolation, security, malicious code, anti-phishing, phishing prevention

Phishing & Ransomware at Singapore GovWare

Posted by Kowsik Guruswamy on Oct 18, 2016

I was in Singapore last week attending GovWare, speaking at the event and also meeting a number of customers and partners. Land of eternal summer, I think the lows were in the high 70's which made my morning runs, huh, interesting. Isolation is not a new concept here in Singapore, as the government pulled out 100,000 computers (de-linked) from the Internet to avoid any malware contamination. The government personnel are given dedicated kiosks (black computers) from which they can access the Internet, but that's about it. This is an extreme form of Isolation, while 100% safe, is also at cross-roads with user experience. But this has been the history of Isolation though. We've always been forced to trade off between security and user experience. Security by shackles.

Read More

Tags: phishing, ransomware, singapore, govware

Mass Downloads of Documents Still Include Malware

Posted by Greg Cross on Oct 14, 2016

A new and rapid growth trend during the U.S. political season is that various treasure troves of leaked documents now await  the masses on the Internet, including via sites like WikiLeaks and "Guccifer 2.0’s” latest Wordpress blog. 

Read More

Tags: malware, cybersecurity, phishing, isolation, pdf, security, ransomware, risk, malicious code, malware vulnerabilities, cyber theft, security strategy, email attachments

Reducing Risk by Eliminating the Phish

Posted by Greg Maudsley on Oct 4, 2016

 Recently, I’ve been speaking with a lot of CISOs, security industry veterans, and analysts about risk.

Read More

Tags: malware, cybersecurity, phishing, threats, isolation, security, ransomware, credential theft, drive-by exploits

Black Hat 2016: An Overload of Senses from Culinary Excess to a Tsunami of Cyber Events

Posted by Lennart van den Ende on Aug 16, 2016

Las Vegas has a tendency to overload all of your senses. Similarly Black Hat, too, has the effect of inducing information overload on nearly every participant.

Read More

Tags: malware, cybersecurity, phishing, sandbox, trends, threats, isolation, security, black hat

Pawn Storm: The Return Of Java 0days

Posted by Kowsik Guruswamy on Jul 13, 2015

Dubbed "Operation Pawn Storm," this series of attacks targets military officials as well as various defense contractors. This campaign follows a common playbook (see Rombertik - Rise of Self Aware Malware) of infecting a Website (or typosquatted domain), making it a phishing site, then targets a small group of users - in this case NATO & US defense organization personnel - with spear-phishing emails. Hackers then deliver malware through legitimate Websites using malicious iframes injected into them. Checkout the Trend Micro's analysis from 2014 on Operation Pawn Storm for more details. 

Read More

Tags: malware, phishing, java

Connect with us

Lists by Topic

see all

Recent Posts